Functional Encryption Resilient to Hard-to-Invert Leakage

被引:9
|
作者
Zhang, Mingwu [1 ,2 ]
Wang, Chunzhi [1 ]
Takagi, Tsuyoshi [2 ]
Mu, Yi [3 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 04期
基金
中国国家自然科学基金;
关键词
functional encryption; leakage resilience; hard-to-invert function; minimal set; ATTRIBUTE-BASED ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1093/comjnl/bxt105
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Functional encryption (FE) systems provide a flexible and expressive encryption mechanism that private keys and ciphertexts are associated with attributes (x) over right arrow and predicate formulae Gamma and decryption are possible whenever keys and ciphertexts are related, i.e. Gamma((x) over right arrow) = 1. In this work, we put forward a leakage-resilient FE scheme against the amount of leakage output over a hard-to-invert function family. In our scheme, the encryption policy is specified as an arbitrary monotonic formula, and the adversary can learn the arbitrary length output of the master key and the private key from any computationally irreversible function with the input (master) keys. To improve the efficiency, we employ the set of minimal sets to describe the predicate formula or access structure, and initiate the formal model of leakage-resilient FE, which is a generic extension of identity-based encryption and attribute-based encryption in the presence of key leakage with auxiliary inputs. We provide the concrete construction in bilinear groups of composite order, and prove the adaptively leakage-resilient security in the standard model based on static assumptions. Our hard-to-invert leakage resilience employs the Goldreich-Levin theorem and its extension as a hard-core value over large fields. We also give an extensional construction in the case of obtaining the hard-to-invert randomness leakage of the encryption, which uses a strong extractor to prevent leakage of randomness and a hard-to-invert encryption to prevent the leakage of the key. Finally, we analyze and discuss the stepped-up security on master leakage and continual leakage, and the lower bound of the irreversible leakage function.
引用
收藏
页码:735 / 749
页数:15
相关论文
共 50 条
  • [1] On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
    De Santis, Fabrizio
    Rass, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 127 - 145
  • [2] Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
    Ishizaka, Masahito
    Matsuura, Kanta
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 422 - 441
  • [3] Signature Schemes Secure Against Hard-to-Invert Leakage
    Faust, Sebastian
    Hazay, Carmit
    Nielsen, Jesper Buus
    Zottarel, Angela
    Nordholt, Peter Sebastian
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 422 - 455
  • [4] Signature Schemes Secure Against Hard-to-Invert Leakage
    Sebastian Faust
    Carmit Hazay
    Jesper Buus Nielsen
    Peter Sebastian Nordholt
    Angela Zottarel
    [J]. Journal of Cryptology, 2016, 29 : 422 - 455
  • [5] Signature Schemes Secure against Hard-to-Invert Leakage
    Faust, Sebastian
    Hazay, Carmit
    Nielsen, Jesper Buus
    Nordholt, Peter Sebastian
    Zottarel, Angela
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 98 - 115
  • [6] Continuous hard-to-invert functions and biometric authentication
    Grigoriev, Dima
    Nikolenko, Sergey
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2012, 4 (01) : 19 - 32
  • [7] Leakage-Resilient Functional Encryption via Pair Encodings
    Yu, Zuoxia
    Au, Man Ho
    Xu, Qiuliang
    Yang, Rupeng
    Han, Jinguang
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 443 - 460
  • [8] Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
    Catalano, Dario
    Pointcheval, David
    Pornin, Thomas
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 115 - 149
  • [9] Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
    Dario Catalano
    David Pointcheval
    Thomas Pornin
    [J]. Journal of Cryptology, 2007, 20 : 115 - 149
  • [10] Leakage Resilient ElGamal Encryption
    Kiltz, Eike
    Pietrzak, Krzysztof
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 595 - +